/third_party/mbedtls/tests/suites/ |
D | test_suite_psa_crypto_op_fail.function | 80 mbedtls_svc_key_id_t key_id = MBEDTLS_SVC_KEY_ID_INIT; 94 &key_id)); 97 psa_mac_sign_setup(&operation, key_id, alg)); 99 psa_mac_verify_setup(&operation, key_id, alg)); 101 psa_mac_compute(key_id, alg, 105 psa_mac_verify(key_id, alg, 111 psa_destroy_key(key_id); 126 mbedtls_svc_key_id_t key_id = MBEDTLS_SVC_KEY_ID_INIT; 140 &key_id)); 143 psa_cipher_encrypt_setup(&operation, key_id, alg)); [all …]
|
D | test_suite_psa_crypto_persistent_key.function | 125 mbedtls_svc_key_id_t key_id = mbedtls_svc_key_id_make(1, 42); 134 psa_set_key_id(&attributes, key_id); 137 TEST_EQUAL(psa_import_key(&attributes, data, data_length, &key_id), 141 PSA_ASSERT(psa_destroy_key(key_id)); 147 psa_destroy_persistent_key(key_id); 156 mbedtls_svc_key_id_t key_id = 165 psa_set_key_id(&attributes, key_id); 172 psa_close_key(key_id); 176 TEST_EQUAL(psa_is_key_present_in_storage(key_id), 1); 179 PSA_ASSERT(psa_destroy_key(key_id)); [all …]
|
D | test_suite_psa_crypto_not_supported.function | 19 mbedtls_svc_key_id_t key_id = INVALID_KEY_ID; 25 &key_id), 27 TEST_ASSERT(mbedtls_svc_key_id_equal(key_id, MBEDTLS_SVC_KEY_ID_INIT)); 30 psa_destroy_key(key_id); 39 mbedtls_svc_key_id_t key_id = INVALID_KEY_ID; 44 TEST_EQUAL(psa_generate_key(&attributes, &key_id), 46 TEST_ASSERT(mbedtls_svc_key_id_equal(key_id, MBEDTLS_SVC_KEY_ID_INIT)); 49 psa_destroy_key(key_id);
|
D | test_suite_psa_crypto_storage_format.function | 236 mbedtls_svc_key_id_t key_id = psa_get_key_id(expected_attributes); 246 PSA_ASSERT(psa_get_key_attributes(key_id, &actual_attributes)); 247 TEST_ASSERT(mbedtls_svc_key_id_equal(key_id, 263 PSA_ASSERT(psa_export_key(key_id, 272 key_id, 281 TEST_EQUAL(PSA_ERROR_NOT_PERMITTED, psa_destroy_key(key_id)); 284 PSA_ASSERT(psa_destroy_key(key_id)); 321 mbedtls_svc_key_id_t key_id = mbedtls_svc_key_id_make(0, 1); 326 TEST_USES_KEY_ID(key_id); 329 psa_set_key_id(&attributes, key_id); [all …]
|
D | test_suite_psa_crypto_generate_key.function | 19 mbedtls_svc_key_id_t key_id = INVALID_KEY_ID; 29 TEST_EQUAL(psa_generate_key(&attributes, &key_id), 35 PSA_ASSERT(psa_get_key_attributes(key_id, &attributes)); 45 psa_destroy_key(key_id);
|
D | test_suite_lmots.function | 31 void lmots_sign_verify_test(data_t *msg, data_t *key_id, int leaf_id, 42 key_id->x, leaf_id, seed->x, seed->len), 0); 55 void lmots_sign_verify_null_msg_test(data_t *key_id, int leaf_id, data_t *seed) 65 key_id->x, leaf_id, seed->x, seed->len), 0); 199 void lmots_reuse_test(data_t *msg, data_t *key_id, int leaf_id, data_t *seed) 206 key_id->x, leaf_id, seed->x, 224 void lmots_signature_leak_test(data_t *msg, data_t *key_id, int leaf_id, 237 key_id->x, leaf_id, seed->x,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant_lib/ |
D | wpa_evp_key.c | 81 static EVP_PKEY *wrap_rsa(const char *key_id, const RSA *public_rsa) in wrap_rsa() argument 103 if (strlen(key_id) < sizeof(g_key_uri)) in wrap_rsa() 104 os_memcpy(g_key_uri, key_id, strlen(key_id)); in wrap_rsa() 108 static EVP_PKEY* get_pubkey(const char *key_id) in get_pubkey() argument 117 BIO* bio = BIO_from_cm(key_id, certificate); in get_pubkey() 139 EVP_PKEY *GET_EVP_PKEY(const char *key_id) in GET_EVP_PKEY() argument 145 if (key_id == NULL) { in GET_EVP_PKEY() 149 pub_key = get_pubkey(key_id); in GET_EVP_PKEY() 169 wrap_key = wrap_rsa(key_id, public_rsa); in GET_EVP_PKEY() 174 BIO *BIO_from_cm(const char *key_id, struct Credential certificate) in BIO_from_cm() argument [all …]
|
D | wpa_evp_key.h | 20 EVP_PKEY *GET_EVP_PKEY(const char *key_id); 21 BIO *BIO_from_cm(const char *key_id, struct Credential certificate);
|
/third_party/libcoap/src/oscore/ |
D | oscore.c | 151 cose->key_id.s, in oscore_prepare_e_aad() 152 cose->key_id.length); in oscore_prepare_e_aad() 218 if (cose->key_id.s != NULL) { in oscore_encode_option_value() 220 if (cose->key_id.length) { in oscore_encode_option_value() 221 memcpy(&(option_buffer[offset]), cose->key_id.s, cose->key_id.length); in oscore_encode_option_value() 222 offset += cose->key_id.length; in oscore_encode_option_value() 223 assert(rem_space > cose->key_id.length); in oscore_encode_option_value() 224 rem_space -= cose->key_id.length; in oscore_encode_option_value() 294 coap_bin_const_t key_id; in oscore_decode_option_value() local 296 key_id.length = option_len - offset; in oscore_decode_option_value() [all …]
|
D | oscore_cose.c | 346 cose_encrypt0_set_key_id(cose_encrypt0_t *ptr, coap_bin_const_t *key_id) { in cose_encrypt0_set_key_id() argument 347 if (key_id) { in cose_encrypt0_set_key_id() 348 ptr->key_id = *key_id; in cose_encrypt0_set_key_id() 350 ptr->key_id.length = 0; in cose_encrypt0_set_key_id() 351 ptr->key_id.s = NULL; in cose_encrypt0_set_key_id() 357 *buffer = ptr->key_id.s; in cose_encrypt0_get_key_id() 358 return ptr->key_id.length; in cose_encrypt0_get_key_id()
|
/third_party/ltp/testcases/kernel/syscalls/keyctl/ |
D | keyctl07.c | 20 key_serial_t key_id; in try_to_read_negative_key() local 50 &key_id, sizeof(key_id))); in try_to_read_negative_key() 53 if (TST_RET != sizeof(key_id)) { in try_to_read_negative_key() 55 TST_RET, sizeof(key_id)); in try_to_read_negative_key() 63 TEST(keyctl(KEYCTL_READ, key_id, buffer, sizeof(buffer))); in try_to_read_negative_key()
|
/third_party/mbedtls/tests/include/test/ |
D | psa_crypto_helpers.h | 67 int mbedtls_test_uses_key_id(mbedtls_svc_key_id_t key_id); 106 #define TEST_USES_KEY_ID(key_id) \ argument 107 TEST_ASSERT(mbedtls_test_uses_key_id(key_id)) 111 #define TEST_USES_KEY_ID(key_id) ((void) (key_id)) argument
|
/third_party/mbedtls/tests/src/ |
D | psa_crypto_helpers.c | 39 int mbedtls_test_uses_key_id(mbedtls_svc_key_id_t key_id) in mbedtls_test_uses_key_id() argument 42 if (MBEDTLS_SVC_KEY_ID_GET_KEY_ID(key_id) > in mbedtls_test_uses_key_id() 48 if (mbedtls_svc_key_id_equal(key_id, key_ids_used_in_test[i])) { in mbedtls_test_uses_key_id() 55 key_ids_used_in_test[num_key_ids_used] = key_id; in mbedtls_test_uses_key_id()
|
/third_party/mbedtls/library/ |
D | pk_wrap.c | 208 mbedtls_svc_key_id_t key_id = MBEDTLS_SVC_KEY_ID_INIT; in rsa_verify_wrap() local 240 &key_id); in rsa_verify_wrap() 246 status = psa_verify_hash(key_id, psa_alg_md, hash, hash_len, in rsa_verify_wrap() 255 status = psa_destroy_key(key_id); in rsa_verify_wrap() 307 mbedtls_svc_key_id_t key_id = MBEDTLS_SVC_KEY_ID_INIT; in mbedtls_pk_psa_rsa_sign_ext() local 333 &key_id); in mbedtls_pk_psa_rsa_sign_ext() 338 status = psa_sign_hash(key_id, alg, hash, hash_len, in mbedtls_pk_psa_rsa_sign_ext() 348 status = psa_destroy_key(key_id); in mbedtls_pk_psa_rsa_sign_ext() 408 mbedtls_svc_key_id_t key_id = MBEDTLS_SVC_KEY_ID_INIT; in rsa_decrypt_wrap() local 442 &key_id); in rsa_decrypt_wrap() [all …]
|
D | psa_crypto_slot_management.c | 50 psa_key_id_t key_id = MBEDTLS_SVC_KEY_ID_GET_KEY_ID(key); in psa_is_valid_key_id() local 52 if ((PSA_KEY_ID_USER_MIN <= key_id) && in psa_is_valid_key_id() 53 (key_id <= PSA_KEY_ID_USER_MAX)) { in psa_is_valid_key_id() 58 (PSA_KEY_ID_VENDOR_MIN <= key_id) && in psa_is_valid_key_id() 59 (key_id <= PSA_KEY_ID_VENDOR_MAX)) { in psa_is_valid_key_id() 101 psa_key_id_t key_id = MBEDTLS_SVC_KEY_ID_GET_KEY_ID(key); in psa_get_and_lock_key_slot_in_memory() local 105 if (psa_key_id_is_volatile(key_id)) { in psa_get_and_lock_key_slot_in_memory() 106 slot = &global_data.key_slots[key_id - PSA_KEY_ID_VOLATILE_MIN]; in psa_get_and_lock_key_slot_in_memory()
|
D | psa_crypto_slot_management.h | 54 static inline int psa_key_id_is_volatile(psa_key_id_t key_id) in psa_key_id_is_volatile() argument 56 return (key_id >= PSA_KEY_ID_VOLATILE_MIN) && in psa_key_id_is_volatile() 57 (key_id <= PSA_KEY_ID_VOLATILE_MAX); in psa_key_id_is_volatile()
|
/third_party/openssl/crypto/engine/ |
D | eng_pkey.c | 56 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, in ENGINE_load_private_key() argument 77 pkey = e->load_privkey(e, key_id, ui_method, callback_data); in ENGINE_load_private_key() 85 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, in ENGINE_load_public_key() argument 106 pkey = e->load_pubkey(e, key_id, ui_method, callback_data); in ENGINE_load_public_key()
|
/third_party/node/deps/openssl/openssl/crypto/engine/ |
D | eng_pkey.c | 56 EVP_PKEY *ENGINE_load_private_key(ENGINE *e, const char *key_id, in ENGINE_load_private_key() argument 77 pkey = e->load_privkey(e, key_id, ui_method, callback_data); in ENGINE_load_private_key() 85 EVP_PKEY *ENGINE_load_public_key(ENGINE *e, const char *key_id, in ENGINE_load_public_key() argument 106 pkey = e->load_pubkey(e, key_id, ui_method, callback_data); in ENGINE_load_public_key()
|
/third_party/ffmpeg/libavutil/ |
D | encryption_info.c | 47 info->key_id = av_mallocz(key_id_size); in av_encryption_info_alloc() 55 if (!info->key_id || !info->iv || (!info->subsamples && subsample_count)) { in av_encryption_info_alloc() 75 memcpy(ret->key_id, info->key_id, info->key_id_size); in av_encryption_info_clone() 83 av_free(info->key_id); in av_encryption_info_free() 112 memcpy(info->key_id, buffer + 24, key_id_size); in av_encryption_info_get_side_data() 149 memcpy(cur_buffer, info->key_id, info->key_id_size); in av_encryption_info_add_side_data()
|
/third_party/openssl/apps/lib/ |
D | engine.c | 105 char *make_engine_uri(ENGINE *e, const char *key_id, const char *desc) in make_engine_uri() argument 112 } else if (key_id == NULL) { in make_engine_uri() 120 + strlen(key_id) in make_engine_uri() 129 OPENSSL_strlcat(new_uri, key_id, uri_sz); in make_engine_uri()
|
/third_party/node/deps/openssl/openssl/apps/lib/ |
D | engine.c | 105 char *make_engine_uri(ENGINE *e, const char *key_id, const char *desc) in make_engine_uri() argument 112 } else if (key_id == NULL) { in make_engine_uri() 120 + strlen(key_id) in make_engine_uri() 129 OPENSSL_strlcat(new_uri, key_id, uri_sz); in make_engine_uri()
|
/third_party/mesa3d/src/util/tests/hash_table/ |
D | clear.c | 35 static uint32_t key_id(const void *key) in key_id() function 87 assert(key_id(entry->key) < SIZE); in main() 101 assert(key_id(entry->key) < SIZE); in main()
|
/third_party/mbedtls/include/psa/ |
D | crypto_values.h | 2428 unsigned int unused, psa_key_id_t key_id) in mbedtls_svc_key_id_make() argument 2432 return key_id; in mbedtls_svc_key_id_make() 2462 #define MBEDTLS_SVC_KEY_ID_GET_KEY_ID(id) ((id).MBEDTLS_PRIVATE(key_id)) 2471 mbedtls_key_owner_id_t owner_id, psa_key_id_t key_id) in mbedtls_svc_key_id_make() argument 2473 return (mbedtls_svc_key_id_t){ .MBEDTLS_PRIVATE(key_id) = key_id, in mbedtls_svc_key_id_make() 2487 return (id1.MBEDTLS_PRIVATE(key_id) == id2.MBEDTLS_PRIVATE(key_id)) && in mbedtls_svc_key_id_equal() 2499 return key.MBEDTLS_PRIVATE(key_id) == 0; in mbedtls_svc_key_id_is_null()
|
/third_party/ffmpeg/libavutil/tests/ |
D | encryption_info.c | 40 if (memcmp(a->key_id, b->key_id, a->key_id_size) != 0 || in compare_encryption_info() 81 av_assert0(info->key_id); in run_encryption_info_test() 91 memcpy(info->key_id, test_key_id, sizeof(test_key_id)); in run_encryption_info_test()
|
/third_party/node/deps/openssl/openssl/engines/ |
D | e_ossltest.c | 376 static EVP_PKEY *load_key(ENGINE *eng, const char *key_id, int pub, in load_key() argument 382 if (OPENSSL_strncasecmp(key_id, "ot:", 3) != 0) in load_key() 384 key_id += 3; in load_key() 387 pub ? "Public" : "Private", key_id); in load_key() 388 in = BIO_new_file(key_id, "r"); in load_key() 399 static EVP_PKEY *ossltest_load_privkey(ENGINE *eng, const char *key_id, in ossltest_load_privkey() argument 402 return load_key(eng, key_id, 0, ui_method, ui_data); in ossltest_load_privkey() 405 static EVP_PKEY *ossltest_load_pubkey(ENGINE *eng, const char *key_id, in ossltest_load_pubkey() argument 408 return load_key(eng, key_id, 1, ui_method, ui_data); in ossltest_load_pubkey()
|